Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea Andariel Hacker Behind US Sanctions Fraudulent IT Worker Scheme
Identity

North Korea Andariel Hacker Behind US Sanctions Fraudulent IT Worker Scheme

userBy userJuly 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The U.S. Treasury Department’s Foreign Assets Administration Department (OFAC) approved members of a North Korean hacking group called Andariel on Tuesday for their role in the infamous Remote Information Technology (IT) worker scheme.

The Treasury Ministry said Song Kum Heeok, a 38-year-old North Korean national with an address in Jiling Province, China, has enabled fraudulent operations by using foreign employed IT workers to seek remote employment with US companies and planning to split their income with them.

Between 2022 and 2023, the song is said to have created aliases for hired workers using the identity of people in the United States, such as names, addresses, and Social Security numbers.

The development comes days after the US Department of Justice (DOJ) announced a sweeping measure targeting the North Korean Information Technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites and nearly 200 computers.

Cybersecurity

Sanctions have also been imposed on Russian citizens and four entities involved in the Russian-based IT workers scheme, which North Koreans contracted and hosted to stop malicious operations. This is –

Gayk Asatryan, who used Russia-based company Asatryan LLC and Fortuna LLC to employ North Korean IT workers Songkwang Trading General Corporation, has collaborated with Asatryan to sign a contract with Asatryan LLC South Korea’s Saenal Saenal Trading Corporation.

Sanctions are only marked when threat actors linked to Andariel, a subcluster within the Lazarus group, are tied to IT worker schemes that have become important illegal revenue streams for the nation of sanctions orders. The Lazarus Group is credited with partnership with the Democratic Republic of Korea (DPRK) Reconnaissance General (RGB).

The action “emphasizes the importance of vigilance against DPRK’s continued efforts to secretly fund the WMD and ballistic missile program,” said Michael Foulkender, deputy secretary of the Treasury Department.

“The Treasury is committed to using all the tools available to disrupt Kim. [Jong Un] The administration’s efforts to avoid sanctions through digital property theft, attempts to impersonate Americans, and malicious cyberattacks.”

The IT Worker Scheme, also tracked as Nickel Tapestry, Wagemall, and UNC5267, includes using North Korean actors to acquire employment with US companies as remote IT workers with the goal of portraying complex skin-based pay using a mix of stolen fictional identities.

The insider threat is just one of many ways Pyongyang has adopted to generate revenue in the country. Data compiled by TRM Labs shows that North Korea is behind about $1.6 billion of the total $2.1 billion stolen as a result of 75 cryptocurrency hacks and exploits in the first half of 2025 alone.

While most of the measures taken to combat the threat have been ostensibly born from US authorities, DTEX principal I3 insider risk investigator Michael “Barni” Burnhart told Hacker News that other countries have stepped up and acted similarly, promoting awareness among a larger audience.

“This is a complex, cross-border issue with many moving parts, so international collaboration and open communication are extremely useful,” says Barnhart.

“As an example of the complexity with this issue, North Korean IT workers could be physically located in China, employing front companies posing as Singapore-based companies, contracting with European vendors serving US clients. That level of operational layering highlights the effective counter-struggle of joint research and intelligence sharing.”

Cybersecurity

“The good news is that awareness has increased significantly in recent years and we are now seeing the fruits of that labor. These initial recognition steps are part of a wider global change to recognize and actively disrupt these threats.”

Sanctions of the Sanctions Dovetail reportedly a group located in North Korea tracked as Kimsuky (aka APT-C-55) using a backdoor called Happydoor in an attack targeting South Korea’s presence. According to Anlab, Happydoor is being used back to 2021.

Malware, normally distributed via spear phishing email attacks, has steadily improved over the years, allowing you to collect sensitive information. Run commands, PowerShell code, and batch scripts. Upload the files you are interested in.

“Threat actors who are primarily responsible for teaching and academic disguises use social engineering techniques such as spear phishing to install backdoors with attachments and distribute attachments that may install additional malware.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow to automate ticket creation, device identification, and threat triage with tines
Next Article EDF confirms 12.5% ​​shares in Sizewell c
user
  • Website

Related Posts

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025

How to automate ticket creation, device identification, and threat triage with tines

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

TC starts all stages in Boston, six days until the end of savings up to $475

Samsung launches Z Fold7 and Z Flip7 and adds a cheap Z Flip7 Fe ​​to its collapsible lineup

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.